Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Java, enterprise integration and open source Java.

Filter the library by ...
CLEAR

eBook | Presented by Smarsh

The Chief Risk Officer and the Dreadful, Horrid, Inefficient, Very Bad Day

These days, it's not enough for your organization to address damage to your reputation after it is already done. You must spot potential risk as soon as possible prevent it from spiraling out of control. Download our ebook to see what a dreadful, horrid, inefficient, very bad day might look life in the life of a Chief Risk Officer - and how you can avoid one yourself.

eBook | Presented by Safebreach

Breach and Attack Simulation Primer

This brief overview provides a light description about Breach and Attack Simulation, and how it can continuously validate your security.

eBook | Presented by One Identity

Identity Analytics - A more comprehensive defense in the battle to reduce risk and enhance security

Almost every company has instances of users who have inappropriate entitlements because they are improperly provisioned or because they change roles and the old permissions are not de-provisioned. There's a great deal of risk associated with inappropriate or excessive rights, and bad actors love to exploit this. IT security teams must take a more proactive stance to reduce identity-related risk. Now they can.

eBook | Presented by One Identity

Future-Proof Your Tactical IAM Projects.

This e-book offers five fundamentals to help you find a new approach to identity access and management (IAM) security. Implement a future-ready approach to IAM that will address your immediate user access challenges while also preparing you to deal with what comes next - even if you don't know what that is.

eBook | Presented by One Identity

Future-Ready Identity and Access Management

This e-book offers five fundamentals to help you find a new approach to identity access and management (IAM) security. Implement a future-ready approach to IAM that will address your immediate user access challenges while also preparing you to deal with what comes next - even if you don't know what that is.

eBook | Presented by One Identity

IAM for the Real World Access Management

Access is usually the highest priority when taking on IAM challenges, but how do you do it most effectively? In this e-book, you'll discover: today's key challenges for effective access management; the most common identity administration principles; the significant benefits that can come from getting to one identity.

eBook | Presented by One Identity

Identity and Access Management for the Real World The Fundamentals

This short e-book "Identity and Access Management for the Real World" evaluates what IAM for the real world would, should and can look like, including best practices. It delves into the most pressing identity management and access management issues faced by virtually every organization and offers actionable, affordable and sustainable best practices for the IAM challenges you face.

eBook | Presented by Citrix Systems Inc

Reducing the Cost of Your Next ADC Refresh

Get More Value from Your ADCs. Evaluate the costs of your next ADC refresh. You need an ADC strategy that goes beyond hardware and offers you flexibility and choice as you transition workloads to the cloud. Are you confident that your current strategy is delivering the best return on investment for your business?

eBook | Presented by One Identity

The top five ways to relieve the pain of managing hybrid AD environments

Active Directory is everywhere and Azure Active Directory (AAD), its rapidly growing, cloud-based cousin, is quickly gaining ground. But, you should know that AAD is not simply a cloud copy of an on-prem AD instance. It is a wholly separate environment. That's why you need to read this eBook. In it, you'll learn about five potentially pain-inducing challenges you must overcome as you transition your organization to a hybrid AD implementation.

eBook | Presented by One Identity

Top ten reasons to achieve Data Access Governance

You've got nearly all the pieces in place - you've implemented enterprise user provisioning, password management and have secured your organization's data. However, most days you still feel that sensitive data, such as IP or customer information, is at risk for a data breach. It's time to let a secure Data Governance strategy protect your sensitive data and reduce risk. Why, you ask? Take a look at this quick-read e-Book to learn ten reasons why.

Load More